CyberProtex
  • SERVICES
    • Managed Services >
      • mssp
      • Security Operations Center
      • Operational Technology
      • Tabletop Exercises
      • Continuous Monitoring
      • Endpoint Protection
    • Security and Compliance >
      • NIST 800-171 Assessments
      • CMMC Assessments
      • Incident Response
      • Penetration Testing
      • Vulnerability Assessments
      • Phishing Simulations
  • SOFTWARE
    • Azure Migrations >
      • Azure Security and Federation
      • Identity and Access Management
    • Dynamics 365
    • SQL Management
    • DevSecOps
    • Application Security
    • Software Products >
      • Vulnerability Genius Software
      • eMASS Simulator Software
      • ICS - SCADA Simulations
      • CyberLMS Software
  • Training
    • CMMC Workshop
    • Certification Courses >
      • Cybersecurity Certifications >
        • CISSP
        • Security+
        • SecurityX
        • CISM
        • CySA+
        • CCSP
        • Cloud+
        • A+
      • Microsoft Certifications >
        • SC-900
        • PL-900
    • Tabletop Exercises
    • ICS - SCADA Training
    • YouTube Channel
    • Online Courses
    • BLOGS
  • About Us
    • Careers
    • Partners
    • Corporate-Offices >
      • Training Center
    • Community Outreach
    • Top Certs of 2025
  • Contact
CyberProtex - Types of Viruses Matching Game

CyberProtex - Types of Computer Virus Terms Matching Game

Drag and Drop the Terms Numbers to the appropriate Definition

Macro Virus
Stealth Virus
Polymorphic Virus
Boot sector Virus
Multipartite Virus
Program or File Virus
Infects executables (other programs, with affixes such as EXE, BIN, COM, SYS)
Infects boot sectors on hard and floppy disks
A hybrid of a program and boot sector virus
Triggers on a command in Microsoft Office Commonly affects Word & Excel
Uses various tactics to avoid detection.
Uses encryption to foil detection, so that it appears differently in each infection.
CyberProtex, LLC - 2012-2025

[email protected]

256-401-7072
Picture
Picture
  • SERVICES
    • Managed Services >
      • mssp
      • Security Operations Center
      • Operational Technology
      • Tabletop Exercises
      • Continuous Monitoring
      • Endpoint Protection
    • Security and Compliance >
      • NIST 800-171 Assessments
      • CMMC Assessments
      • Incident Response
      • Penetration Testing
      • Vulnerability Assessments
      • Phishing Simulations
  • SOFTWARE
    • Azure Migrations >
      • Azure Security and Federation
      • Identity and Access Management
    • Dynamics 365
    • SQL Management
    • DevSecOps
    • Application Security
    • Software Products >
      • Vulnerability Genius Software
      • eMASS Simulator Software
      • ICS - SCADA Simulations
      • CyberLMS Software
  • Training
    • CMMC Workshop
    • Certification Courses >
      • Cybersecurity Certifications >
        • CISSP
        • Security+
        • SecurityX
        • CISM
        • CySA+
        • CCSP
        • Cloud+
        • A+
      • Microsoft Certifications >
        • SC-900
        • PL-900
    • Tabletop Exercises
    • ICS - SCADA Training
    • YouTube Channel
    • Online Courses
    • BLOGS
  • About Us
    • Careers
    • Partners
    • Corporate-Offices >
      • Training Center
    • Community Outreach
    • Top Certs of 2025
  • Contact